Data sealing with a sealing enclave

    公开(公告)号:US10931652B2

    公开(公告)日:2021-02-23

    申请号:US15414492

    申请日:2017-01-24

    发明人: Manuel Costa

    摘要: Techniques for securely sealing and unsealing enclave data across platforms are presented. Enclave data from a source enclave hosted on a first computer may be securely sealed to a sealing enclave on a second computer, and may further be securely unsealed for a destination enclave on a third computer. Securely transferring an enclave workload from one computer to another is disclosed.

    Cross-platform enclave data sealing

    公开(公告)号:US10911451B2

    公开(公告)日:2021-02-02

    申请号:US15414371

    申请日:2017-01-24

    发明人: Manuel Costa

    IPC分类号: H04L29/06 G06F21/64 G06F21/60

    摘要: Techniques for securely sealing and unsealing enclave data across platforms are presented. Enclave data from a source enclave hosted on a first computer may be securely sealed to a sealing enclave on a second computer, and may further be securely unsealed for a destination enclave on a third computer. Securely transferring an enclave workload from one computer to another is disclosed.

    Automatic risk analysis of software

    公开(公告)号:US10747652B2

    公开(公告)日:2020-08-18

    申请号:US15831959

    申请日:2017-12-05

    摘要: Techniques are described herein that are capable of performing automatic risk analysis of software. An automatic risk analyzer may determine correlations between binaries of the software and source files of the software, between the source files and functions (i.e., sub-routines) of the software, between changes to source code of the software and defects, new features, and/or feature enhancements in the software, between attributes of the software (e.g., attributes associated with the changes to the source code), etc. at various time instances. The automatic risk analyzer may compare the correlations corresponding to a first time instance and the correlations corresponding to a second time instance to determine any of a variety of temporal relationships regarding underlying factors, including but not limited to new feature(s), feature enhancement(s), defect(s), churn rate, code coverage, code complexity, etc. The automatic risk analyzer may determine risk(s) for the software based on the temporal relationships.

    Containing an application in an immersive non-windowed environment

    公开(公告)号:US10565026B2

    公开(公告)日:2020-02-18

    申请号:US14813091

    申请日:2015-07-29

    IPC分类号: G06F9/54 G06F9/448 G06F9/451

    摘要: Techniques are described herein that are capable of containing an application in an immersive non-windowed environment. For instance, the application may be configured for use in a windowed environment. Containing the application in the immersive non-windowed environment may involve selectively implementing functionality that is associated with the application based at least in part on whether the functionality is applicable to the immersive non-windowed environment. For example, when a request to implement functionality that is not applicable to the immersive non-windowed environment is received, functionality that is applicable to the immersive non-windowed environment may be implemented in lieu of the functionality that is not applicable to the immersive non-windowed environment. In another example, no action may be taken with regard to the request.

    Social-based information recommendation system

    公开(公告)号:US10261759B2

    公开(公告)日:2019-04-16

    申请号:US14809783

    申请日:2015-07-27

    摘要: Techniques are described herein that are capable of recommending information that is contextually related to code using a social data graph. A machine learning technique is used to determine that the information is contextually related to the code. A social data graph is a graph database that stores information associated with users in a social networking environment. For instance, such information may be retrieved from user profiles, social updates, etc. of the users. A social networking environment is an online service, platform, or domain (e.g., Web site) that facilitates the building of social networks (e.g., social relations) among people who share interests, activities, backgrounds, real-life connections, etc.

    User interface for multi-device control

    公开(公告)号:US10230538B2

    公开(公告)日:2019-03-12

    申请号:US13252826

    申请日:2011-10-04

    摘要: A control server, or similar central processor, manages the distribution of data (including audio and video), voice, and control signals among a plurality of system components connected via a wired and/or wireless communications network. The system components include audio/visual components (such as, televisions, monitors, PDAs, notepads, notebooks, MP3, portable stereo, etc.) as well as household appliances (such as, lighting, ovens, alarm clocks, etc.). A portable controller allows a user to access and control the system components from any location within a controlled residential and/or non-residential environment, including its surrounding areas. The portable controller includes a user and management interface that contains customized control screens for the system components. The control screens are stored in a hierarchical architecture that is searchable by region or component type.

    Deep cloning of objects using binary format

    公开(公告)号:US09817857B2

    公开(公告)日:2017-11-14

    申请号:US14603569

    申请日:2015-01-23

    IPC分类号: G06F17/30 G06F9/44

    摘要: Techniques are described herein that are capable of deep cloning (a.k.a. deep copying) objects using a binary format. A deep clone of a designated object includes references to other objects (and potentially copies of the other objects) included in the designated object. A binary representation of each object in an object graph is generated to provide a binary clone of the object graph. Objects created by a dynamic language engine are called dynamic language objects. Objects created by a host (e.g., that hosts the dynamic language engine) are called host objects. Each host object is associated with an intermediate representation thereof via a property bag that describes properties of that host object. Each intermediate representation is understandable by the dynamic language engine. A binary representation of each dynamic language object and each host object may be generated in accordance with the binary format to provide the binary clone.